Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

radareorg — Vulnerabilities & Security Advisories 53

Browse all 53 CVE security advisories affecting radareorg. AI-powered Chinese analysis, POCs, and references for each vulnerability.

radareorg operates as a provider of reverse engineering frameworks and security analysis tools, primarily serving developers and security researchers who require low-level binary inspection capabilities. Historical vulnerability assessments indicate a pattern of common web application flaws, with Remote Code Execution (RCE) and Cross-Site Scripting (XSS) representing the most frequent attack vectors. These issues often stem from insufficient input validation within the platform’s administrative interfaces or web-based management consoles. While the core binary analysis engine remains relatively stable, the associated web components have historically exhibited privilege escalation risks, allowing unauthorized users to gain elevated access. Security audits reveal that many of the recorded Common Vulnerabilities and Exposures (CVEs) relate to outdated dependencies or misconfigured access controls rather than fundamental architectural defects. Consequently, maintaining strict patch management and enforcing robust authentication mechanisms are critical for mitigating the identified risks associated with this software ecosystem.

Top products by radareorg: radareorg/radare2 radare2
CVE IDTitleCVSSSeverityPublished
CVE-2022-1238 Out-of-bounds Write in libr/bin/format/ne/ne.c in radareorg/radare2 — radareorg/radare2CWE-787 7.8 -2022-04-06
CVE-2022-1244 heap-buffer-overflow in radareorg/radare2 — radareorg/radare2CWE-122 5.5 -2022-04-05
CVE-2022-1207 Out-of-bounds read in radareorg/radare2 — radareorg/radare2CWE-125 5.5 -2022-04-01
CVE-2022-1052 Heap Buffer Overflow in iterate_chained_fixups in radareorg/radare2 — radareorg/radare2CWE-122 6.2 -2022-03-24
CVE-2022-1061 Heap Buffer Overflow in parseDragons in radareorg/radare2 — radareorg/radare2CWE-122 6.5 -2022-03-24
CVE-2022-1031 Use After Free in op_is_set_bp in radareorg/radare2 — radareorg/radare2CWE-416 7.8 -2022-03-22
CVE-2022-0849 Use After Free in r_reg_get_name_idx in radareorg/radare2 — radareorg/radare2CWE-416 7.1 -2022-03-05
CVE-2022-0695 Denial of Service in radareorg/radare2 — radareorg/radare2CWE-400 6.2 -2022-02-24
CVE-2022-0476 Denial of Service in radareorg/radare2 — radareorg/radare2CWE-400 6.2 -2022-02-23
CVE-2022-0713 Heap-based Buffer Overflow in radareorg/radare2 — radareorg/radare2CWE-122 7.1 -2022-02-22
CVE-2022-0712 NULL Pointer Dereference in radareorg/radare2 — radareorg/radare2CWE-476 5.5 -2022-02-22
CVE-2022-0676 Heap-based Buffer Overflow in radareorg/radare2 — radareorg/radare2CWE-122 7.1 -2022-02-22
CVE-2022-0559 Use After Free in radareorg/radare2 — radareorg/radare2CWE-416 7.8 -2022-02-16
CVE-2022-0522 Access of Memory Location Before Start of Buffer in radareorg/radare2 — radareorg/radare2CWE-786 7.1 -2022-02-08
CVE-2022-0521 Access of Memory Location After End of Buffer in radareorg/radare2 — radareorg/radare2CWE-788 7.1 -2022-02-08
CVE-2022-0520 Use After Free in radareorg/radare2 — radareorg/radare2CWE-416 7.8 -2022-02-08
CVE-2022-0519 Buffer Access with Incorrect Length Value in radareorg/radare2 — radareorg/radare2CWE-805 7.8 -2022-02-08
CVE-2022-0518 Heap-based Buffer Overflow in radareorg/radare2 — radareorg/radare2CWE-122 7.1 -2022-02-08
CVE-2022-0139 Use After Free in radareorg/radare2 — radareorg/radare2CWE-416 7.8 -2022-02-08
CVE-2022-0523 Use After Free in radareorg/radare2 — radareorg/radare2CWE-416 7.8 -2022-02-08
CVE-2022-0419 NULL Pointer Dereference in radareorg/radare2 — radareorg/radare2CWE-476 5.5 -2022-02-01
CVE-2022-0173 Out-of-bounds Read in radareorg/radare2 — radareorg/radare2CWE-125 5.5 -2022-01-11
CVE-2020-15121 Command injection in Radare2 — radare2CWE-78 7.4 High2020-07-20

This page lists every published CVE security advisory associated with radareorg. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.